期刊文献+

基于数字签名的安全数字水印协议 被引量:2

A Secure Watermarking Protocol Based on Digital Signature
下载PDF
导出
摘要 论文在论述数字水印应用面临的攻击和DHWM协议存在安全隐患的基础上,提出了一种新的基于数字签名的安全数字水印协议。该协议引入数字证书,将数字签名、时间戳和水印信息一起嵌入到数字图像中。通过安全性分析和性能分析,该协议能抵抗中间人攻击、解释攻击,并能检测数字图像是否被非法篡改,可实际应用于数字图像的版权保护。 A new secure watermarking protocol which is based on digital signature is proposed through discussing about the attack over watermarking and the security leak of DHWM protocol.The new protocol imports certificate,and embeds signature,timestamp,watermarking information into digital image.By security analysing and performance analysing,it proves that the protocol can resist the middle-man attack ,the interpreting attack.And it can detect whether the digital image is modified illegally.The new protocol will be applied to copyright protection of digital image.
作者 肖菁 李建华
出处 《计算机工程与应用》 CSCD 北大核心 2006年第16期160-162,共3页 Computer Engineering and Applications
关键词 DHWM 数字签名 时间戳 数字水印 DHWM, digital signature, timestamp, digital watermarking
  • 相关文献

参考文献8

  • 1F A P Petitcolas,R J Anderson,M G Kuhn.Information Hiding A Survey[C].In: Proc IEEE, 1999: 1062-1078
  • 2X Zhang,S Wang,K Zhang.Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences,Computer Network Securlty.Lecture Notes in Computer Science, Springer-Verlag,2003;2776: 407-418
  • 3W Lie,L Chang.Data Hiding In Images with Adaptive Numbers of Least Significant Bits Based on the Human Visual System[C].In :Proc IEEE Int Conf Images Processing,Kobe,japan,1999;1:286-290
  • 4V Gorodetsky,V Samoilov.Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel. Computer Network Security.Lecture Notes in Computer Science,Springer-Verlag, 2003; 2776: 349-359
  • 5Hyung-Woo Lee.Information hiding for EC-public key traitor tracing for digital copyright protection[C].In: ISIE 2001, Pusan, KOREA, 2001: 1357-1361
  • 6D Kundur,D Hatzinakos.Diversity and Attack Characterization for Improved Robust Water-marking[C].In:IEEE trans on Signal Processing, 2001; 49: 2383-2396
  • 7D Augot,J-F Delaigle,C Fontaine,DHWM:A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System[C].In:Proceedings of the 5th European Symposium on Research in Computer Security? (ESORICS98),Louvain-la-Neave,Belgium,Lectures Notes in Computer Security,Springer-Verlag,1998;1485:241-256
  • 8Bubnis E,Evans S,Fischer P et al.Open-source PKI on SELinux. DARPA Information Survivability Conference and Exposition[C].In: Proceedings,2003,2: 170-175

同被引文献8

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部